📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology CRITICAL 1h Global phishing Multiple Sectors HIGH 1h Global vulnerability Technology/Software HIGH 2h Global general Multiple sectors MEDIUM 4h Global phishing Telecommunications and Financial Services HIGH 4h Global data_breach Utilities and Critical Infrastructure HIGH 20h Global vulnerability Technology/Software MEDIUM 1d Global malware Multiple sectors (general) HIGH 1d Global apt Government CRITICAL 2d Global apt Critical Infrastructure / Nuclear Energy CRITICAL 2d Global vulnerability Information Technology CRITICAL 1h Global phishing Multiple Sectors HIGH 1h Global vulnerability Technology/Software HIGH 2h Global general Multiple sectors MEDIUM 4h Global phishing Telecommunications and Financial Services HIGH 4h Global data_breach Utilities and Critical Infrastructure HIGH 20h Global vulnerability Technology/Software MEDIUM 1d Global malware Multiple sectors (general) HIGH 1d Global apt Government CRITICAL 2d Global apt Critical Infrastructure / Nuclear Energy CRITICAL 2d Global vulnerability Information Technology CRITICAL 1h Global phishing Multiple Sectors HIGH 1h Global vulnerability Technology/Software HIGH 2h Global general Multiple sectors MEDIUM 4h Global phishing Telecommunications and Financial Services HIGH 4h Global data_breach Utilities and Critical Infrastructure HIGH 20h Global vulnerability Technology/Software MEDIUM 1d Global malware Multiple sectors (general) HIGH 1d Global apt Government CRITICAL 2d Global apt Critical Infrastructure / Nuclear Energy CRITICAL 2d
Vulnerabilities

CVE-2026-20944

High
Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CWE-125 — Weakness Type
Published: Jan 13, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.4
🔗 NVD Official
📄 Description (English)

Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to execute code locally.

🤖 AI Executive Summary

CVE-2026-20944 is a high-severity out-of-bounds read vulnerability in Microsoft Office Word affecting Microsoft 365 Apps and Office LTSC versions. An unauthorized attacker can exploit this vulnerability to execute arbitrary code locally on affected systems. With a CVSS score of 8.4 and no public exploit currently available, this represents a significant but manageable risk that requires prompt patching across enterprise deployments.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 24, 2026 20:56
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations heavily dependent on Microsoft Office for daily operations. Banking sector (SAMA-regulated institutions) faces critical risk due to extensive use of Word for document processing and financial reporting. Government entities under NCA oversight are at high risk given widespread Office deployment across federal and local agencies. Healthcare sector utilizing Office for patient records and administrative functions requires immediate attention. Energy sector (ARAMCO and subsidiaries) and telecommunications (STC, Mobily) with enterprise Office deployments are moderately affected. The local code execution capability makes this particularly dangerous in environments with shared workstations or where users have administrative privileges.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare Energy and Utilities Telecommunications Education Manufacturing
⚖️ Saudi Risk Score (AI)
7.8
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Inventory all Microsoft Office Word installations across the organization, including Microsoft 365 Apps (Enterprise x64/x86) and Office LTSC 2021/2024 on macOS
2. Prioritize patching for systems in high-risk departments (finance, government affairs, healthcare records)
3. Restrict Word document opening from untrusted sources until patches are applied
4. Disable macros in Word as a temporary compensating control

PATCHING GUIDANCE:
1. Deploy latest Microsoft Office updates immediately through Windows Update or Microsoft Update
2. For Microsoft 365 Apps: Update to latest version (typically monthly updates)
3. For Office LTSC 2021/2024: Apply security updates from Microsoft Security Update Guide
4. Verify patch installation using Get-OfficeVersion PowerShell cmdlet

COMPENSATING CONTROLS (if patching delayed):
1. Implement application whitelisting to restrict Word.exe execution
2. Use AppLocker or Windows Defender Application Control policies
3. Monitor and block suspicious Word processes attempting code execution
4. Restrict user permissions to prevent local code execution impact

DETECTION RULES:
1. Monitor for Word.exe spawning child processes (cmd.exe, powershell.exe, cscript.exe)
2. Alert on Word accessing unusual memory regions or system APIs
3. Track failed Word document parsing attempts in event logs
4. Monitor for abnormal registry modifications initiated by Word processes
5. Implement YARA rules for malicious Office document patterns
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. قم بحصر جميع تثبيتات Microsoft Office Word عبر المنظمة، بما في ذلك تطبيقات Microsoft 365 (Enterprise x64/x86) و Office LTSC 2021/2024 على macOS
2. أولويات التصحيح للأنظمة في الأقسام عالية المخاطر (المالية، الشؤون الحكومية، سجلات الرعاية الصحية)
3. تقييد فتح مستندات Word من مصادر غير موثوقة حتى يتم تطبيق التصحيحات
4. تعطيل وحدات الماكروز في Word كإجراء تعويضي مؤقت

إرشادات التصحيح:
1. نشر أحدث تحديثات Microsoft Office فورًا عبر Windows Update أو Microsoft Update
2. لتطبيقات Microsoft 365: التحديث إلى أحدث إصدار (عادة تحديثات شهرية)
3. لـ Office LTSC 2021/2024: تطبيق تحديثات الأمان من دليل تحديث أمان Microsoft
4. التحقق من تثبيت التصحيح باستخدام أمر PowerShell Get-OfficeVersion

الضوابط التعويضية (إذا تأخر التصحيح):
1. تنفيذ قائمة بيضاء للتطبيقات لتقييد تنفيذ Word.exe
2. استخدام سياسات AppLocker أو Windows Defender Application Control
3. مراقبة وحظر عمليات Word المريبة التي تحاول تنفيذ الكود
4. تقييد أذونات المستخدم لمنع تأثير تنفيذ الكود المحلي

قواعد الكشف:
1. مراقبة Word.exe لإنشاء عمليات فرعية (cmd.exe, powershell.exe, cscript.exe)
2. تنبيهات على Word الوصول إلى مناطق ذاكرة غير عادية أو واجهات برمجية للنظام
3. تتبع محاولات تحليل مستندات Word الفاشلة في سجلات الأحداث
4. مراقبة التعديلات غير الطبيعية للسجل التي يبدأها عمليات Word
5. تنفيذ قواعد YARA لأنماط مستندات Office الضارة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information security policies and procedures A.8.1.1 - User access management A.12.2.1 - Change management procedures A.12.6.1 - Management of technical vulnerabilities
🔵 SAMA CSF
ID.RA-1 - Asset management and vulnerability identification PR.IP-12 - Software, firmware, and information integrity mechanisms DE.CM-8 - Vulnerability scans are performed
🟡 ISO 27001:2022
A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development policy A.12.2.1 - Change management
🟣 PCI DSS v4.0
6.2 - Ensure all system components and software are protected from known vulnerabilities 6.1 - Establish a process to identify and assign a risk rating to newly discovered security vulnerabilities
📦 Affected Products / CPE 4 entries
microsoft:365_apps:-
microsoft:365_apps:-
microsoft:office_long_term_servicing_channel:2021
microsoft:office_long_term_servicing_channel:2024
📊 CVSS Score
8.4
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorL — Low / Local
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.4
CWECWE-125
EPSS0.03%
Exploit No
Patch ✓ Yes
Published 2026-01-13
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
7.8
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
CWE-125
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.